Category: Politics

The new cyber coordinator position (AKA cyber czar) as described is a position with no real authority, lots of responsibility, and minimal resources. In most worldly views this is an abhorrent lack of command and control for the cyber security…

Seeing this meme roll through the Web 2.0 sphere as shocked and horrified stories of adult children are arrogantly disgusted that their social activities are ousted to their parents is hilarious. What isn’t so hilarious is the whimsical childishness of…

Want to put a deep crimp in cyber warfare capability of foreign nations? Do you have a nagging desire to give indigestion to NSA analysts? Do you lie awake at night worried that the latest emails from foreign governments might…

When the terrorist attacks occurred in Mumbai local media was able to report extensively as it occurred. Social media pundits were able to analyze and evaluate the different channels of communication. Social media tools like Twitter with near real time…

I don’t get invited to cool conferences to speak. I don’t live in Washington D.C. More importantly I’m a relative nobody and that empowers me. I have nothing to lose and I can be forthright in what I say. Heck…

The blogosphere is alight with discussion over section 18 “Cybersecurity responsibilities and authority” of the draft Cybersecurity Act 2009. The key phrase that has multiple organizations in a dither is located on page 44 and states “…The President… (2) may…

The cyber arena is filled with the effluvia of vendor driven agendas and political wrangling for budgetary dollars. As a topic cyber security is especially vulnerable as the waning leadership and expertise is so centralized in so few individuals that…

The Quadrennial roles and mission review report is from the Department of Defense (DOD) to congress and highlights key aspects of the core mission areas and competencies of the military. The documents as written also includes a section on roles and…

Our long dead Prussian friend understood that tactics change with time and technology, and that strategies remain similar even if the metaphors change. When he tells us that strength of will is more to make a change in strategy versus…

As the nation comes to grips with what is likely another great depression. Regardless of categories or quantities it is THE worst recession since the great depression. As the nation attempts to consider the ramifications of double-digit unemployment (I know…

A common refrain of the uninformed is that I have nothing to hide so therefore I don’t care who peeks through my window. Until the power balance of the country or community changes and when political views are no longer…

As I turn Carl Von Clausewitz over in my mind the writing of a long dead Prussian floats forward in time hopefully to inform decision about future conflict. If, as I have said, the concept that tactics and strategy are…

Can “On War” as a book from the dustbin of history reach out and touch the technologically sophisticated future of modern warfare? Where warfare is moving from monumental armies into a post nuclear age of niggling little conflicts is a…

The 44th president of the United States while not a technologist is an avid user of technology. Though considered by many to be addictive the reality is a Blackberry represents the open flow of information and is the spirit of…

Web Resources

Cyber?

Cyber security and the technologies of securing the information enterprise of industry and government require a trans-disciplinary while still STEM focused research agenda. The term “cyber” itself denotes a human cognitive centric concept that deals with the disintermediation of technology centered within human activity. The changing focus from system threat mitigation to enterprise risk management has opened completely new areas of inquiry into security.

Power

Amateurs argue about crime and punishment. Experts argue about authorities and budgets.